jangeisbauer / gundog2Links
Microsoft 365 Defender Hunting via PowerShell.
☆13Updated 3 years ago
Alternatives and similar repositories for gundog2
Users that are interested in gundog2 are comparing it to the libraries listed below
Sorting:
- Azure AD Incident Response☆26Updated 3 years ago
- ☆43Updated 4 years ago
- Automation around Entra ID☆37Updated 7 months ago
- Jupyter notebooks☆25Updated 4 years ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆36Updated 5 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆23Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- ☆41Updated 2 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆29Updated 3 weeks ago
- ☆42Updated last year
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- ☆14Updated 4 years ago
- MalwareAnalysis☆12Updated 4 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆20Updated 10 months ago
- ☆17Updated 3 years ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- Azure Sentinel Template parser☆16Updated 4 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆36Updated 3 years ago
- AppLocker hardening policies☆25Updated 6 years ago
- ☆17Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆54Updated last month
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 7 months ago
- ☆20Updated last year
- ☆16Updated 2 years ago